{"id":1330,"date":"2013-09-30T20:08:19","date_gmt":"2013-09-30T17:08:19","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1330"},"modified":"2013-09-30T20:08:19","modified_gmt":"2013-09-30T17:08:19","slug":"good-to-know-critical-controls-for-effective-cyber-defense","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1330","title":{"rendered":"Good to Know, Critical Controls for Effective Cyber Defense"},"content":{"rendered":"<p>Often referred as &#8220;<a href=\"http:\/\/www.sans.org\/critical-security-controls\/\">SANS Twenty Critical Security Controls for Effective Cyber Defense<\/a>&#8220;, is a collection of controls which are believed to have the greatest impact in improving risk posture against real-world threats.<\/p>\n<p>There is no shortcut or &#8220;miracle medicin&#8221; when it comes to information security. However, it is good to know this material as supporting information, and it is worth to browse through the material.<\/p>\n<p><strong>Links<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.sans.org\/critical-security-controls\/\">Main page<\/a><\/li>\n<li><a href=\"http:\/\/www.sans.org\/critical-security-controls\/cag4-1.pdf\">Controls document<\/a><\/li>\n<li><a href=\"http:\/\/www.sans.org\/critical-security-controls\/spring-2013-poster.pdf\">Poster<\/a><\/li>\n<li><a href=\"http:\/\/www.sans.org\/critical-security-controls\/vendor-solutions\/\">Vendor Solutions for the controls<\/a><\/li>\n<li><a href=\"http:\/\/www.sans.org\/critical-security-controls\/CSC_Survey_2013.pdf\">Survey 2013, Moving From Awareness to Action<\/a>\n<ul>\n<li>The table below shows table 1 from the survey. It lists both the control and the level of adoption<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img loading=\"lazy\" alt=\"CSC-levelsofAdoption\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2013\/09\/csc-levelsofadoption.png\" width=\"550\" height=\"524\" \/><\/p>\n<p><strong>Other links<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/www.cpni.gov.uk\/advice\/cyber\/Critical-controls\/\">CSC page at CPNI (UK)<\/a><\/li>\n<li><a href=\"http:\/\/www.counciloncybersecurity.org\/practice-areas\/technology\">CSC page at Council of CyberSecurity<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Often referred as &#8220;SANS Twenty Critical Security Controls for Effective Cyber Defense&#8220;, is a collection of controls which are believed to have the greatest impact in improving risk posture against real-world threats. There is no shortcut or &#8220;miracle medicin&#8221; when &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1330\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[62,60,32,30,44,10],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1330"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1330"}],"version-history":[{"count":0,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1330\/revisions"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}